ID

VAR-202101-1926


CVE

CVE-2021-3156


TITLE

Sudo set_cmd() is vulnerable to heap-based buffer overflow

Trust: 0.8

sources: CERT/CC: VU#794544

DESCRIPTION

Sudo before 1.9.5p2 contains an off-by-one error that can result in a heap-based buffer overflow, which allows privilege escalation to root via "sudoedit -s" and a command-line argument that ends with a single backslash character. A heap-based overflow has been discovered in the set_cmd() function in sudo, which may allow a local attacker to execute commands with elevated administrator privileges.CVE-2021-3156 AffectedCVE-2021-3156 Affected. sudo has a heap-based buffer overflow due to the implementation of escaping special characters set in command arguments (CWE-122) Vulnerability exists. 2021 Year 2 Moon 5 As of the date macOS , AIX , Solaris It has been reported that it may also be affected by the virus, but it has not been confirmed by the finder. note that, 2021 Year 2 Moon 9 On the day Apple has released a security update to address this issue.A local third party can elevate privileges and execute commands with administrator privileges. 7.3) - x86_64 3. 8.2) - aarch64, ppc64le, s390x, x86_64 3. This update provides the corresponding update for Ubuntu 12.04 ESM and Ubuntu 14.04 ESM. ========================================================================== Ubuntu Security Notice USN-4705-1 January 26, 2021 sudo vulnerabilities ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 20.10 - Ubuntu 20.04 LTS - Ubuntu 18.04 LTS - Ubuntu 16.04 LTS Summary: Several security issues were fixed in Sudo. A local attacker could possibly use this issue to obtain unintended access to the administrator account. (CVE-2021-3156) It was discovered that the Sudo sudoedit utility incorrectly handled checking directory permissions. A local attacker could possibly use this issue to bypass file permissions and determine if a directory exists or not. (CVE-2021-23239) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 20.10: sudo 1.9.1-1ubuntu1.1 sudo-ldap 1.9.1-1ubuntu1.1 Ubuntu 20.04 LTS: sudo 1.8.31-1ubuntu1.2 sudo-ldap 1.8.31-1ubuntu1.2 Ubuntu 18.04 LTS: sudo 1.8.21p2-3ubuntu1.4 sudo-ldap 1.8.21p2-3ubuntu1.4 Ubuntu 16.04 LTS: sudo 1.8.16-0ubuntu1.10 sudo-ldap 1.8.16-0ubuntu1.10 In general, a standard system update will make all the necessary changes. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ==================================================================== Red Hat Security Advisory Synopsis: Important: sudo security update Advisory ID: RHSA-2021:0223-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2021:0223 Issue date: 2021-01-26 CVE Names: CVE-2021-3156 ==================================================================== 1. Summary: An update for sudo is now available for Red Hat Enterprise Linux 7.6 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux ComputeNode EUS (v. 7.6) - x86_64 Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6) - x86_64 Red Hat Enterprise Linux Server EUS (v. 7.6) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Optional EUS (v. 7.6) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7) - aarch64, ppc64le, s390x Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7) - aarch64, ppc64le, s390x 3. Description: The sudo packages contain the sudo utility which allows system administrators to provide certain users with the permission to execute privileged commands, which are used for system management purposes, without having to log in as root. Security Fix(es): * sudo: Heap buffer overflow in argument parsing (CVE-2021-3156) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1917684 - CVE-2021-3156 sudo: Heap buffer overflow in argument parsing 6. Package List: Red Hat Enterprise Linux ComputeNode EUS (v. 7.6): Source: sudo-1.8.23-3.el7_6.2.src.rpm x86_64: sudo-1.8.23-3.el7_6.2.x86_64.rpm sudo-debuginfo-1.8.23-3.el7_6.2.x86_64.rpm Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6): x86_64: sudo-debuginfo-1.8.23-3.el7_6.2.i686.rpm sudo-debuginfo-1.8.23-3.el7_6.2.x86_64.rpm sudo-devel-1.8.23-3.el7_6.2.i686.rpm sudo-devel-1.8.23-3.el7_6.2.x86_64.rpm Red Hat Enterprise Linux Server EUS (v. 7.6): Source: sudo-1.8.23-3.el7_6.2.src.rpm ppc64: sudo-1.8.23-3.el7_6.2.ppc64.rpm sudo-debuginfo-1.8.23-3.el7_6.2.ppc64.rpm ppc64le: sudo-1.8.23-3.el7_6.2.ppc64le.rpm sudo-debuginfo-1.8.23-3.el7_6.2.ppc64le.rpm s390x: sudo-1.8.23-3.el7_6.2.s390x.rpm sudo-debuginfo-1.8.23-3.el7_6.2.s390x.rpm x86_64: sudo-1.8.23-3.el7_6.2.x86_64.rpm sudo-debuginfo-1.8.23-3.el7_6.2.x86_64.rpm Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7): Source: sudo-1.8.23-3.el7_6.2.src.rpm aarch64: sudo-1.8.23-3.el7_6.2.aarch64.rpm sudo-debuginfo-1.8.23-3.el7_6.2.aarch64.rpm ppc64le: sudo-1.8.23-3.el7_6.2.ppc64le.rpm sudo-debuginfo-1.8.23-3.el7_6.2.ppc64le.rpm s390x: sudo-1.8.23-3.el7_6.2.s390x.rpm sudo-debuginfo-1.8.23-3.el7_6.2.s390x.rpm Red Hat Enterprise Linux Server Optional EUS (v. 7.6): ppc64: sudo-debuginfo-1.8.23-3.el7_6.2.ppc.rpm sudo-debuginfo-1.8.23-3.el7_6.2.ppc64.rpm sudo-devel-1.8.23-3.el7_6.2.ppc.rpm sudo-devel-1.8.23-3.el7_6.2.ppc64.rpm ppc64le: sudo-debuginfo-1.8.23-3.el7_6.2.ppc64le.rpm sudo-devel-1.8.23-3.el7_6.2.ppc64le.rpm s390x: sudo-debuginfo-1.8.23-3.el7_6.2.s390.rpm sudo-debuginfo-1.8.23-3.el7_6.2.s390x.rpm sudo-devel-1.8.23-3.el7_6.2.s390.rpm sudo-devel-1.8.23-3.el7_6.2.s390x.rpm x86_64: sudo-debuginfo-1.8.23-3.el7_6.2.i686.rpm sudo-debuginfo-1.8.23-3.el7_6.2.x86_64.rpm sudo-devel-1.8.23-3.el7_6.2.i686.rpm sudo-devel-1.8.23-3.el7_6.2.x86_64.rpm Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7): aarch64: sudo-debuginfo-1.8.23-3.el7_6.2.aarch64.rpm sudo-devel-1.8.23-3.el7_6.2.aarch64.rpm ppc64le: sudo-debuginfo-1.8.23-3.el7_6.2.ppc64le.rpm sudo-devel-1.8.23-3.el7_6.2.ppc64le.rpm s390x: sudo-debuginfo-1.8.23-3.el7_6.2.s390.rpm sudo-debuginfo-1.8.23-3.el7_6.2.s390x.rpm sudo-devel-1.8.23-3.el7_6.2.s390.rpm sudo-devel-1.8.23-3.el7_6.2.s390x.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2021-3156 https://access.redhat.com/security/updates/classification/#important https://access.redhat.com/security/vulnerabilities/RHSB-2021-002 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2021 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBYBCATtzjgjWX9erEAQiDkQ/8CyCFW0G3itmCMGwXsP5atS6Tgqc4zwbC ofAgAgWoKKlwelFIMra1XlbcwSiqDKyxRvZVXiberbmvsecRShd7y29CMf75R2FO P7qGv5BY8BLX0zDwHHNTSCdX4EXoMi4OUUzmO4JEgys8Vc0QfLyEpQJbIPJaeE/C OI6niwwsSKeB06CjOpmHef/xoltdiCRkAJ84A3wBN8L603Lbl7Ou1PpomXFTmBpx 1ZI+vHe+rGXLMLYsJOyZSi87spHiXX7ZUwHwf3LOpQvIEP3tTU7QVykAsB2nIWIh VVqjPwOeK4wxM1xn2DtBAeBE1m3QG9xBirIQosAUqh8v7coWyy+kNZxxnFKS8v5F ZuQpsM2c0EbEcz7QL703in6m/1fG8oT6QI/K0PQvAQBlxt4XG0N1Shz1XfCa884z 0xF5C31bd8tDOuakZNPg7ePLXpaZtyn/CZ5kyWIaSkMV5J1vYZIHPyJpb83QecUr c9vjQgD49kz2FzwJkGPcWAeqjBVFrRbE7TJQ8IAzkM08x6XeKuLp8sXixzhXzboy 9TBb65s22fEiHlMCcqW62QJGELPDLSwVvjasnX0tzkSE5t6NYV6HDbHRYcHJEG2b BWwYRlTvgfK1sodYoCGs6IeJVD8nHIeflNgkn0WQIbOznJjmBjgXXGGdj0XPDDuD l3p+edOWn0U=GeG5 -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce

Trust: 2.97

sources: NVD: CVE-2021-3156 // CERT/CC: VU#794544 // JVNDB: JVNDB-2021-001020 // VULHUB: VHN-383931 // VULMON: CVE-2021-3156 // PACKETSTORM: 161139 // PACKETSTORM: 161140 // PACKETSTORM: 161163 // PACKETSTORM: 161135 // PACKETSTORM: 161145

AFFECTED PRODUCTS

vendor:netappmodel:hci management nodescope:eqversion: -

Trust: 1.0

vendor:sudomodel:sudoscope:gteversion:1.9.0

Trust: 1.0

vendor:oraclemodel:communications performance intelligence centerscope:lteversion:10.3.0.2.1

Trust: 1.0

vendor:netappmodel:ontap select deploy administration utilityscope:eqversion: -

Trust: 1.0

vendor:oraclemodel:micros es400scope:gteversion:400

Trust: 1.0

vendor:oraclemodel:communications performance intelligence centerscope:lteversion:10.4.0.3.1

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:9.0

Trust: 1.0

vendor:mcafeemodel:web gatewayscope:eqversion:10.0.4

Trust: 1.0

vendor:beyondtrustmodel:privilege management for macscope:ltversion:21.1.1

Trust: 1.0

vendor:mcafeemodel:web gatewayscope:eqversion:9.2.8

Trust: 1.0

vendor:oraclemodel:micros es400scope:lteversion:410

Trust: 1.0

vendor:synologymodel:skynasscope:eqversion: -

Trust: 1.0

vendor:oraclemodel:communications performance intelligence centerscope:gteversion:10.3.0.0.0

Trust: 1.0

vendor:fedoraprojectmodel:fedorascope:eqversion:32

Trust: 1.0

vendor:synologymodel:diskstation managerscope:eqversion:6.2

Trust: 1.0

vendor:sudomodel:sudoscope:ltversion:1.8.32

Trust: 1.0

vendor:oraclemodel:micros kitchen display systemscope:eqversion:210

Trust: 1.0

vendor:beyondtrustmodel:privilege management for unix\/linuxscope:ltversion:10.3.2-10

Trust: 1.0

vendor:sudomodel:sudoscope:ltversion:1.9.5

Trust: 1.0

vendor:oraclemodel:tekelec platform distributionscope:gteversion:7.4.0

Trust: 1.0

vendor:synologymodel:diskstation manager unified controllerscope:eqversion:3.0

Trust: 1.0

vendor:oraclemodel:micros compact workstation 3scope:eqversion:310

Trust: 1.0

vendor:netappmodel:solidfirescope:eqversion: -

Trust: 1.0

vendor:mcafeemodel:web gatewayscope:eqversion:8.2.17

Trust: 1.0

vendor:oraclemodel:micros workstation 6scope:gteversion:610

Trust: 1.0

vendor:fedoraprojectmodel:fedorascope:eqversion:33

Trust: 1.0

vendor:netappmodel:cloud backupscope:eqversion: -

Trust: 1.0

vendor:sudomodel:sudoscope:gteversion:1.8.2

Trust: 1.0

vendor:netappmodel:oncommand unified manager core packagescope:eqversion: -

Trust: 1.0

vendor:synologymodel:vs960hdscope:eqversion: -

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:10.0

Trust: 1.0

vendor:oraclemodel:tekelec platform distributionscope:lteversion:7.7.1

Trust: 1.0

vendor:sudomodel:sudoscope:eqversion:1.9.5

Trust: 1.0

vendor:netappmodel:ontap toolsscope:eqversion:9

Trust: 1.0

vendor:netappmodel:active iq unified managerscope:eqversion: -

Trust: 1.0

vendor:oraclemodel:micros workstation 6scope:lteversion:655

Trust: 1.0

vendor:oraclemodel:communications performance intelligence centerscope:gteversion:10.4.0.1.0

Trust: 1.0

vendor:oraclemodel:micros workstation 5ascope:eqversion:5a

Trust: 1.0

vendor:sudomodel:sudoscope: - version: -

Trust: 0.8

vendor:sudomodel:sudoscope:eqversion:1.9.0 to 1.9.5p1

Trust: 0.8

vendor:sudomodel:sudoscope:eqversion: -

Trust: 0.8

vendor:sudomodel:sudoscope:eqversion:1.8.2 to 1.8.31p2

Trust: 0.8

sources: JVNDB: JVNDB-2021-001020 // NVD: CVE-2021-3156

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2021-3156
value: HIGH

Trust: 1.0

134c704f-9b21-4f2e-91b3-4a467353bcc0: CVE-2021-3156
value: HIGH

Trust: 1.0

NVD: CVE-2021-3156
value: HIGH

Trust: 0.8

VULHUB: VHN-383931
value: HIGH

Trust: 0.1

VULMON: CVE-2021-3156
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2021-3156
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-383931
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2021-3156
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 5.9
version: 3.1

Trust: 2.0

NVD: CVE-2021-3156
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULHUB: VHN-383931 // VULMON: CVE-2021-3156 // JVNDB: JVNDB-2021-001020 // NVD: CVE-2021-3156 // NVD: CVE-2021-3156

PROBLEMTYPE DATA

problemtype:CWE-193

Trust: 1.1

problemtype:Heap-based buffer overflow (CWE-122) [IPA evaluation ]

Trust: 0.8

problemtype: Out-of-bounds writing (CWE-787) [NVD evaluation ]

Trust: 0.8

sources: VULHUB: VHN-383931 // JVNDB: JVNDB-2021-001020 // NVD: CVE-2021-3156

THREAT TYPE

local

Trust: 0.2

sources: PACKETSTORM: 161163 // PACKETSTORM: 161135

TYPE

overflow, root

Trust: 0.3

sources: PACKETSTORM: 161139 // PACKETSTORM: 161140 // PACKETSTORM: 161145

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-383931

PATCH

title:Buffer overflow in command line unescaping Apple Apple Security Updatesurl:https://www.sudo.ws/alerts/unescape_overflow.html

Trust: 0.8

title:Red Hat: Important: sudo security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20210227 - Security Advisory

Trust: 0.1

title:Red Hat: Important: sudo security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20210221 - Security Advisory

Trust: 0.1

title:Red Hat: Important: sudo security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20210225 - Security Advisory

Trust: 0.1

title:Red Hat: Important: sudo security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20210224 - Security Advisory

Trust: 0.1

title:Red Hat: Important: sudo security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20210222 - Security Advisory

Trust: 0.1

title:Red Hat: Important: sudo security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20210226 - Security Advisory

Trust: 0.1

title:Red Hat: Important: sudo security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20210218 - Security Advisory

Trust: 0.1

title:Red Hat: Important: sudo security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20210223 - Security Advisory

Trust: 0.1

title:Red Hat: Important: sudo security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20210219 - Security Advisory

Trust: 0.1

title:Red Hat: Important: sudo security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20210220 - Security Advisory

Trust: 0.1

title:Debian Security Advisories: DSA-4839-1 sudo -- security updateurl:https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories&qid=e39766a043b3a0185adba1c80532d955

Trust: 0.1

title:Red Hat: Important: RHV-H security, bug fix, enhancement update (redhat-virtualization-host) 4.3.13url:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20210395 - Security Advisory

Trust: 0.1

title:Red Hat: Important: Red Hat Virtualization Host security bug fix and enhancement update [ovirt-4.4.4]url:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20210401 - Security Advisory

Trust: 0.1

title:Amazon Linux AMI: ALAS-2021-1478url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami&qid=ALAS-2021-1478

Trust: 0.1

title:Amazon Linux 2: ALAS2-2021-1590url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux2&qid=ALAS2-2021-1590

Trust: 0.1

title:Cisco: Sudo Privilege Escalation Vulnerability Affecting Cisco Products: January 2021url:https://vulmon.com/vendoradvisory?qidtp=cisco_security_advisories_and_alerts_ciscoproducts&qid=cisco-sa-sudo-privesc-jan2021-qnYQfcM

Trust: 0.1

title:TA-Samediturl:https://github.com/stressboi/TA-Samedit

Trust: 0.1

title:ScannerCVE-2021-3156url:https://github.com/SantiagoSerrao/ScannerCVE-2021-3156

Trust: 0.1

title:Título del Proyectourl:https://github.com/lmol/CVE-2021-3156

Trust: 0.1

title:CVE-2021-3156url:https://github.com/reverse-ex/CVE-2021-3156

Trust: 0.1

title:LinuxDocLinksurl:https://github.com/neolin-ms/LinuxDocLinks

Trust: 0.1

title:Baron-Samediturl:https://github.com/AbdullahRizwan101/Baron-Samedit

Trust: 0.1

title:CVE-2021-3156url:https://github.com/ph4ntonn/CVE-2021-3156

Trust: 0.1

sources: VULMON: CVE-2021-3156 // JVNDB: JVNDB-2021-001020

EXTERNAL IDS

db:NVDid:CVE-2021-3156

Trust: 4.1

db:CERT/CCid:VU#794544

Trust: 2.7

db:PACKETSTORMid:161230

Trust: 1.1

db:PACKETSTORMid:161160

Trust: 1.1

db:PACKETSTORMid:161270

Trust: 1.1

db:PACKETSTORMid:161293

Trust: 1.1

db:MCAFEEid:SB10348

Trust: 1.1

db:OPENWALLid:OSS-SECURITY/2021/01/27/2

Trust: 1.1

db:OPENWALLid:OSS-SECURITY/2021/01/26/3

Trust: 1.1

db:OPENWALLid:OSS-SECURITY/2021/02/15/1

Trust: 1.1

db:OPENWALLid:OSS-SECURITY/2021/01/27/1

Trust: 1.1

db:OPENWALLid:OSS-SECURITY/2021/09/14/2

Trust: 1.1

db:OPENWALLid:OSS-SECURITY/2024/01/30/6

Trust: 1.0

db:OPENWALLid:OSS-SECURITY/2024/01/30/8

Trust: 1.0

db:PACKETSTORMid:176932

Trust: 1.0

db:JVNid:JVNVU96493147

Trust: 0.8

db:JVNid:JVNVU99480250

Trust: 0.8

db:JVNid:JVNVU98963695

Trust: 0.8

db:JVNid:JVNVU92304019

Trust: 0.8

db:JVNid:JVNVU90511416

Trust: 0.8

db:JVNid:JVNVU91343607

Trust: 0.8

db:ICS CERTid:ICSA-22-256-01

Trust: 0.8

db:JVNDBid:JVNDB-2021-001020

Trust: 0.8

db:PACKETSTORMid:161163

Trust: 0.2

db:PACKETSTORMid:161140

Trust: 0.2

db:PACKETSTORMid:161139

Trust: 0.2

db:PACKETSTORMid:161135

Trust: 0.2

db:PACKETSTORMid:161145

Trust: 0.2

db:PACKETSTORMid:161143

Trust: 0.1

db:PACKETSTORMid:161141

Trust: 0.1

db:PACKETSTORMid:161152

Trust: 0.1

db:PACKETSTORMid:161138

Trust: 0.1

db:PACKETSTORMid:161144

Trust: 0.1

db:PACKETSTORMid:161142

Trust: 0.1

db:PACKETSTORMid:161272

Trust: 0.1

db:PACKETSTORMid:161398

Trust: 0.1

db:PACKETSTORMid:161136

Trust: 0.1

db:PACKETSTORMid:161281

Trust: 0.1

db:PACKETSTORMid:161137

Trust: 0.1

db:SEEBUGid:SSVID-99117

Trust: 0.1

db:VULHUBid:VHN-383931

Trust: 0.1

db:VULMONid:CVE-2021-3156

Trust: 0.1

sources: CERT/CC: VU#794544 // VULHUB: VHN-383931 // VULMON: CVE-2021-3156 // PACKETSTORM: 161139 // PACKETSTORM: 161140 // PACKETSTORM: 161163 // PACKETSTORM: 161135 // PACKETSTORM: 161145 // JVNDB: JVNDB-2021-001020 // NVD: CVE-2021-3156

REFERENCES

url:http://www.openwall.com/lists/oss-security/2021/01/26/3

Trust: 2.2

url:https://nvd.nist.gov/vuln/detail/cve-2021-3156

Trust: 1.3

url:https://www.kb.cert.org/vuls/id/794544

Trust: 1.1

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-sudo-privesc-jan2021-qnyqfcm

Trust: 1.1

url:https://security.netapp.com/advisory/ntap-20210128-0001/

Trust: 1.1

url:https://security.netapp.com/advisory/ntap-20210128-0002/

Trust: 1.1

url:https://support.apple.com/kb/ht212177

Trust: 1.1

url:https://www.sudo.ws/stable.html#1.9.5p2

Trust: 1.1

url:https://www.synology.com/security/advisory/synology_sa_21_02

Trust: 1.1

url:https://www.debian.org/security/2021/dsa-4839

Trust: 1.1

url:http://seclists.org/fulldisclosure/2021/jan/79

Trust: 1.1

url:http://seclists.org/fulldisclosure/2021/feb/42

Trust: 1.1

url:https://security.gentoo.org/glsa/202101-33

Trust: 1.1

url:http://packetstormsecurity.com/files/161160/sudo-heap-based-buffer-overflow.html

Trust: 1.1

url:http://packetstormsecurity.com/files/161230/sudo-buffer-overflow-privilege-escalation.html

Trust: 1.1

url:http://packetstormsecurity.com/files/161270/sudo-1.9.5p1-buffer-overflow-privilege-escalation.html

Trust: 1.1

url:http://packetstormsecurity.com/files/161293/sudo-1.8.31p2-1.9.5p1-buffer-overflow.html

Trust: 1.1

url:https://www.beyondtrust.com/blog/entry/security-advisory-privilege-management-for-unix-linux-pmul-basic-and-privilege-management-for-mac-pmm-affected-by-sudo-vulnerability

Trust: 1.1

url:https://www.oracle.com//security-alerts/cpujul2021.html

Trust: 1.1

url:https://www.oracle.com/security-alerts/cpuapr2022.html

Trust: 1.1

url:https://www.oracle.com/security-alerts/cpuoct2021.html

Trust: 1.1

url:https://lists.debian.org/debian-lts-announce/2021/01/msg00022.html

Trust: 1.1

url:http://www.openwall.com/lists/oss-security/2021/01/27/1

Trust: 1.1

url:http://www.openwall.com/lists/oss-security/2021/01/27/2

Trust: 1.1

url:http://www.openwall.com/lists/oss-security/2021/02/15/1

Trust: 1.1

url:http://www.openwall.com/lists/oss-security/2021/09/14/2

Trust: 1.1

url:http://seclists.org/fulldisclosure/2024/feb/3

Trust: 1.0

url:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/cala5ftxiqbrryua2zqnjxb6oqmaxeii/

Trust: 1.0

url:http://www.openwall.com/lists/oss-security/2024/01/30/6

Trust: 1.0

url:https://www.vicarius.io/vsociety/posts/sudoedit-pwned-cve-2021-3156

Trust: 1.0

url:http://packetstormsecurity.com/files/176932/glibc-syslog-heap-based-buffer-overflow.html

Trust: 1.0

url:http://www.openwall.com/lists/oss-security/2024/01/30/8

Trust: 1.0

url:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/lhxk6ico5aylgfk2tax5mzkuxtukwojy/

Trust: 1.0

url:https://kc.mcafee.com/corporate/index?page=content&id=sb10348

Trust: 1.0

url:https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=cve-2021-3156

Trust: 1.0

url:cve-2021-3156

Trust: 0.8

url:http://jvn.jp/cert/jvnvu96493147

Trust: 0.8

url:https://jvn.jp/vu/jvnvu92304019/

Trust: 0.8

url:https://jvn.jp/vu/jvnvu98963695/

Trust: 0.8

url:https://jvn.jp/vu/jvnvu91343607/

Trust: 0.8

url:https://jvn.jp/vu/jvnvu99480250/

Trust: 0.8

url:http://jvn.jp/vu/jvnvu90511416/index.html

Trust: 0.8

url:https://www.jpcert.or.jp/at/2021/at210005.html

Trust: 0.8

url:https://kb.cert.org/vuls/id/794544

Trust: 0.8

url:https://www.cisa.gov/uscert/ics/advisories/icsa-22-256-01

Trust: 0.8

url:https://blog.qualys.com/vulnerabilities-research/2021/01/26/cve-2021-3156-heap-based-buffer-overflow-in-sudo-baron-samedit

Trust: 0.8

url:https://www.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.3

url:https://access.redhat.com/security/vulnerabilities/rhsb-2021-002

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2021-3156

Trust: 0.3

url:https://bugzilla.redhat.com/):

Trust: 0.3

url:https://access.redhat.com/security/team/key/

Trust: 0.3

url:https://access.redhat.com/articles/11258

Trust: 0.3

url:https://access.redhat.com/security/team/contact/

Trust: 0.3

url:https://access.redhat.com/security/updates/classification/#important

Trust: 0.3

url:https://usn.ubuntu.com/4705-1

Trust: 0.2

url:https://kc.mcafee.com/corporate/index?page=content&amp;id=sb10348

Trust: 0.1

url:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/lhxk6ico5aylgfk2tax5mzkuxtukwojy/

Trust: 0.1

url:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/cala5ftxiqbrryua2zqnjxb6oqmaxeii/

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2021:0225

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2021:0219

Trust: 0.1

url:https://usn.ubuntu.com/4705-2

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/sudo/1.8.31-1ubuntu1.2

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-23239

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/sudo/1.9.1-1ubuntu1.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/sudo/1.8.16-0ubuntu1.10

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/sudo/1.8.21p2-3ubuntu1.4

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2021:0223

Trust: 0.1

sources: CERT/CC: VU#794544 // VULHUB: VHN-383931 // PACKETSTORM: 161139 // PACKETSTORM: 161140 // PACKETSTORM: 161163 // PACKETSTORM: 161135 // PACKETSTORM: 161145 // JVNDB: JVNDB-2021-001020 // NVD: CVE-2021-3156

CREDITS

This document was written by Timur Snoke.Statement Date:   February 15, 2021

Trust: 0.8

sources: CERT/CC: VU#794544

SOURCES

db:CERT/CCid:VU#794544
db:VULHUBid:VHN-383931
db:VULMONid:CVE-2021-3156
db:PACKETSTORMid:161139
db:PACKETSTORMid:161140
db:PACKETSTORMid:161163
db:PACKETSTORMid:161135
db:PACKETSTORMid:161145
db:JVNDBid:JVNDB-2021-001020
db:NVDid:CVE-2021-3156

LAST UPDATE DATE

2025-11-26T22:11:06.110000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#794544date:2021-04-26T00:00:00
db:VULHUBid:VHN-383931date:2022-09-03T00:00:00
db:VULMONid:CVE-2021-3156date:2024-02-04T00:00:00
db:JVNDBid:JVNDB-2021-001020date:2022-09-15T05:47:00
db:NVDid:CVE-2021-3156date:2025-11-10T14:41:45.053

SOURCES RELEASE DATE

db:CERT/CCid:VU#794544date:2021-02-04T00:00:00
db:VULHUBid:VHN-383931date:2021-01-26T00:00:00
db:VULMONid:CVE-2021-3156date:2021-01-26T00:00:00
db:PACKETSTORMid:161139date:2021-01-27T14:06:12
db:PACKETSTORMid:161140date:2021-01-27T14:06:20
db:PACKETSTORMid:161163date:2021-01-28T13:59:34
db:PACKETSTORMid:161135date:2021-01-27T14:05:32
db:PACKETSTORMid:161145date:2021-01-27T14:07:05
db:JVNDBid:JVNDB-2021-001020date:2021-02-08T00:00:00
db:NVDid:CVE-2021-3156date:2021-01-26T21:15:12.987